Method and system for remote data access using a mobile device
First Claim
Patent Images
1. A computer-implemented method for remote data access using a mobile device, comprising the steps of:
- a remote computer receiving from a first mobile device a first authentication request comprising a first mobile device unique identifier, a first software unique identifier associated with a first software application residing on the first mobile device, a first user name and a first password associated therewith, the first user name and the first password authenticated by a software application on the first mobile device, the first mobile device unique identifier comprising a first device serial number and the first software unique identifier comprising a first software license key;
the remote computer determining whether the first mobile device is authorized for use with the remote computer by determining a valid combination of the first mobile device unique identifier and the first software unique identifier, the remote computer comprising a plurality of security settings, each of the security settings associated with a single mobile device and comprising a unique combination of a mobile device unique identifier and a software unique identifier;
upon determining that the first mobile device is authorized, the remote computer transmitting to the first mobile device a validation message associated with the first mobile device;
the remote computer receiving from the first mobile device a first file copied from the first mobile device;
the remote computer storing a first detail message in a meta-data log, the first detail message associated with the first file copied from the first mobile device to the remote computer, the first detail message comprising at least a name of the first file copied from the first mobile device to the remote computer;
the remote computer receiving from a second mobile device a second authentication request comprising a second mobile device unique identifier, a second software unique identifier associated with a second software application residing on the second mobile device, a second user name, and a second password associated therewith, the second user name and the second password authorized by a software application on the second mobile device, the second mobile device unique identifier comprising a second device serial number and the second software unique identifier comprising a second software license key;
the remote computer determining whether the second mobile device is authorized for use with the remote computer by determining a valid combination of the second mobile device unique identifier and the second software unique identifier;
upon determining that the second mobile device is authorized, the remote computer transmitting to the second mobile device a validation message associated with the second mobile device;
the remote computer transmitting to the second mobile device a copy of the first file copied from the first mobile device to the remote computer; and
the remote computer storing in the meta-data log a second detail message associated with the first file transmitted from the remote computer to the second mobile device.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for securely storing, retrieving and sharing data using PCs and mobile devices and for controlling and tracking the movement of data to and from a variety of computing and storage devices.
90 Citations
19 Claims
-
1. A computer-implemented method for remote data access using a mobile device, comprising the steps of:
-
a remote computer receiving from a first mobile device a first authentication request comprising a first mobile device unique identifier, a first software unique identifier associated with a first software application residing on the first mobile device, a first user name and a first password associated therewith, the first user name and the first password authenticated by a software application on the first mobile device, the first mobile device unique identifier comprising a first device serial number and the first software unique identifier comprising a first software license key; the remote computer determining whether the first mobile device is authorized for use with the remote computer by determining a valid combination of the first mobile device unique identifier and the first software unique identifier, the remote computer comprising a plurality of security settings, each of the security settings associated with a single mobile device and comprising a unique combination of a mobile device unique identifier and a software unique identifier; upon determining that the first mobile device is authorized, the remote computer transmitting to the first mobile device a validation message associated with the first mobile device; the remote computer receiving from the first mobile device a first file copied from the first mobile device; the remote computer storing a first detail message in a meta-data log, the first detail message associated with the first file copied from the first mobile device to the remote computer, the first detail message comprising at least a name of the first file copied from the first mobile device to the remote computer; the remote computer receiving from a second mobile device a second authentication request comprising a second mobile device unique identifier, a second software unique identifier associated with a second software application residing on the second mobile device, a second user name, and a second password associated therewith, the second user name and the second password authorized by a software application on the second mobile device, the second mobile device unique identifier comprising a second device serial number and the second software unique identifier comprising a second software license key; the remote computer determining whether the second mobile device is authorized for use with the remote computer by determining a valid combination of the second mobile device unique identifier and the second software unique identifier; upon determining that the second mobile device is authorized, the remote computer transmitting to the second mobile device a validation message associated with the second mobile device; the remote computer transmitting to the second mobile device a copy of the first file copied from the first mobile device to the remote computer; and the remote computer storing in the meta-data log a second detail message associated with the first file transmitted from the remote computer to the second mobile device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer-implemented method for remote data access using a mobile device, comprising the steps of:
-
a remote computer receiving from a first mobile device a first authentication request comprising a first mobile device unique identifier, a first software unique identifier associated with a first software application residing on the first mobile device, a first user name and a first password associated therewith the first user name and the first password authenticated by a software application on the first mobile device, the first mobile device unique identifier comprising a first device serial number and the first software unique identifier comprising a first software license key; the remote computer determining whether the first mobile device is authorized for use with the remote computer by determining a valid combination of the first mobile device unique identifier and the first software unique identifier, the remote computer comprising a plurality of security settings, each of the security settings associated with a single mobile device and comprising a unique combination of a mobile device unique identifier and a software unique identifier; upon determining that the first mobile device is authorized, the remote computer transmitting to the first mobile device a validation message associated with the first mobile device; the remote computer receiving from the first mobile device a first file copied from the first mobile device; the remote computer storing a detail message in a meta-data log, the detail message associated with the first file copied from the first mobile device to the remote computer, the detail message comprising at least a name of the first file copied from the first mobile device to the remote computer. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A computer-implemented method for remote data access using a mobile device, comprising the steps of:
-
a remote computer receiving from a second mobile device a second authentication request comprising a second mobile device unique identifier, a second software unique identifier associated with a second software application residing on the second mobile device, a second user name, and a second password associated therewith;
the second mobile device in communication with the remote computer the second user name and the second password authorized by a software application on the second mobile device, the second mobile device unique identifier comprising a second device serial number and the second software unique identifier comprising a second software license key;the remote computer determining whether the second mobile device is authorized for use with the remote computer by determining a valid combination of the second mobile device unique identifier and the second software unique identifier, the remote computer comprising a plurality of security settings, each of the security settings associated with a single mobile device and comprising a unique combination of a mobile device unique identifier and a software unique identifier; upon determining that the second mobile device is authorized, the remote computer transmitting to the second mobile device a validation message associated with the second mobile device; the remote computer transmitting to the second mobile device a copy of a first file copied from a first mobile device to the remote computer; and the remote computer storing in a meta-data log a detail message associated with the first file transmitted from the remote computer to the second mobile device. - View Dependent Claims (16, 17, 18, 19)
-
Specification